Solved

Firewall port opening

Posted on 2016-11-29
2
66 Views
Last Modified: 2016-11-29
Hi

I want open ports 53, 123, 514 and 443 to install a Fortinet device. Is there an easyway to achieve this? I'm using SonicWall TZ215.

Thanks
0
Comment
Question by:jpmoreau
2 Comments
 
LVL 24

Accepted Solution

by:
masnrock earned 250 total points
ID: 41905919
Here is the "advanced" way to do it: http://arcticdog.com/sonicwall-tz215-port-forwarding-quick-start/
If you take this approach, the directions leave out the fact that you need to create services (and a service group).

This article is the wizard-driven way: https://support.software.dell.com/kb/sw7027

Many services are predefined, but not all of them. For a few of them, you will need to create a custom service.
0
 
LVL 37

Assisted Solution

by:bbao
bbao earned 250 total points
ID: 41906003
what's the sonicOS version of your TZ215? depending on the specific OS type, the rules might be different.

however by running its built-in wizard you should.be able to quickly setup port forwarding to internal server on given ports.

be aware that (1) the wizard way may always work but may also cause duplicate rules which is not optional in term of performance. (2) all rules will be having two parts in pair, one for NAT policy and the other is firewall rule.
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now